38,769 research outputs found
Orchestrating Tuple-based Languages
The World Wide Web can be thought of as a global computing architecture supporting the deployment of distributed networked applications. Currently, such applications can be programmed by resorting mainly to two distinct paradigms: one devised for orchestrating distributed services, and the other designed for coordinating distributed (possibly mobile) agents. In this paper, the issue of designing a pro-
gramming language aiming at reconciling orchestration and coordination is investigated. Taking as starting point the orchestration calculus Orc and the tuple-based coordination language Klaim, a new formalism is introduced combining concepts and primitives of the original calculi.
To demonstrate feasibility and effectiveness of the proposed approach, a prototype implementation of the new formalism is described and it is then used to tackle a case study dealing with a simplified but realistic electronic marketplace, where a number of on-line stores allow client
applications to access information about their goods and to place orders
WHO IS THE IDENTIFIABLE VICTIM?--CASTE INTERACTS WITH SYMPATHY IN INDIA
Earlier studies have documented an “identifiable victim effect”-- people donate more to help individual people than to groups. Evidence suggests that this is in part due to an emotional reaction to the identified recipients, who generate more sympathy. However, stereotype research has shown that low-ranking groups are often not seen sympathetically; indeed stigmatized groups can be targets of “dehumanized” perception, perceived with disgust. We conducted an internet survey experiment among Indian participants, crossing the identification treatment with the group membership of the recipient. We indicate group membership of identified recipients subtly, with names that connote a social rank. We found an identifiable recipient effect for generically Indian, high caste, and Muslim recipients, but the effect was reversed for low caste recipients. Participants were as willing to donate to statistical low caste recipients as to statistical high caste recipients, but were less willing to donate to identified low caste recipients.However, an identifiable victim effect was seen for all recipient groups among participants open to a love marriage, a coarse indicator of rejecting caste hierarchy in favor of shared humanity. To our knowledge, this is the first study demonstrating that the identifiable victim effect interacts with the identity of the victim.identifiable victim effect; stereotypes; out-groups; caste; Dalit; pro-social behavior; India
Total Haskell is Reasonable Coq
We would like to use the Coq proof assistant to mechanically verify
properties of Haskell programs. To that end, we present a tool, named
hs-to-coq, that translates total Haskell programs into Coq programs via a
shallow embedding. We apply our tool in three case studies -- a lawful Monad
instance, "Hutton's razor", and an existing data structure library -- and prove
their correctness. These examples show that this approach is viable: both that
hs-to-coq applies to existing Haskell code, and that the output it produces is
amenable to verification.Comment: 13 pages plus references. Published at CPP'18, In Proceedings of 7th
ACM SIGPLAN International Conference on Certified Programs and Proofs
(CPP'18). ACM, New York, NY, USA, 201
On Constructing Persistent Identifiers with Persistent Resolution Targets
Persistent Identifiers (PID) are the foundation referencing digital assets in
scientific publications, books, and digital repositories. In its realization,
PIDs contain metadata and resolving targets in form of URLs that point to data
sets located on the network. In contrast to PIDs, the target URLs are typically
changing over time; thus, PIDs need continuous maintenance -- an effort that is
increasing tremendously with the advancement of e-Science and the advent of the
Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are
subject of PID assignment. This paper presents a new approach of embedding
location independent targets into PIDs that allows the creation of
maintenance-free PIDs using content-centric network technology and overlay
networks. For proving the validity of the presented approach, the Handle PID
System is used in conjunction with Magnet Link access information encoding,
state-of-the-art decentralized data distribution with BitTorrent, and Named
Data Networking (NDN) as location-independent data access technology for
networks. Contrasting existing approaches, no green-field implementation of PID
or major modifications of the Handle System is required to enable
location-independent data dissemination with maintenance-free PIDs.Comment: Published IEEE paper of the FedCSIS 2016 (SoFAST-WS'16) conference,
11.-14. September 2016, Gdansk, Poland. Also available online:
http://ieeexplore.ieee.org/document/7733372
- …